Fantasy Hub Another Russian-based RAT-as-a-Service (MaaS) #1558
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the post covers
Zimperium zLabs analyzes “Fantasy Hub,” an Android Remote Access Trojan commercialized as Malware‑as‑a‑Service (MaaS) on Russian‑language channels. The seller provides a Telegram bot for subscriptions/builds, detailed social‑engineering playbooks, and a full C2. The RAT focuses on device espionage (SMS, calls, contacts, media), live A/V via WebRTC, banking overlays, USSD/call abuse, and notification manipulation. No CVEs are involved; this is abuse of Android role...
🔧 Technical Details
Privilege consolidation via default SMS handler. Social‑engineer the user into granting the app the default SMS role; this single approval unlocks read/send/forward SMS and adjacent flows (e.g., contact/file interactions), enabling reliable 2FA interception and covert message exfiltration without multiple runtime prompts.
Runtime‑only payload decryption in native code. Hide the main payload in
assets/metadata.dat; at runtime a native library reads it, applies a custom 36‑byte‑key XOR, then gzip‑decompresses it (zlibwindowBits=31) and writes the result to disk, reducing static IoCs and hindering sandboxes with environment checks (e.g., root detection).Covert live surveillance over WebRTC. Dynamically fetch WebRTC libs from C2, establish a peer connection, and stream camera/microphone in real time while maintaining a minimal foreground notification (“Live stream active”) so Android keeps the ses...
🤖 Agent Actions
I analyzed the blog and repository, reviewed multiple related HackTricks pages (≥5), and determined the best place to integrate the Fantasy Hub Android RAT tradecraft is the suggested page:
What I added
Files modified
Why this location
No duplicates
References added
All changes were implemented directly in the target file and the references section remains at the end as required.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).